A Security Framework for Internet of Things Systems Based on Dynamic Watermarking for Data Packet Authentication and Anomaly Detection

L Gu - 2023 IEEE International Conference on Industrial …, 2023 - ieeexplore.ieee.org
With the widespread use of Internet of Things (IoT) technology in the supply chain, the threat
of attacks targeting the transmission of IoT data packets is getting more serious. Existing …

Image data protection in IoT applications using significant block selection based image watermarking

VS Verma, S Gupta, P Gupta - Multimedia Tools and Applications, 2023 - Springer
Abstract Recent developments in IoT (Internet of Things) and its importance are significantly
accepted in different applications of medical research, automobile sector, robotics, national …

UAVs employment in the next generation wireless communication systems

H Alsmadi - 2023 - knowledgecommons.lakeheadu.ca
New network architectures of communication systems are required to support and connect
the next generation of wireless networks. This thesis focuses on unmanned aerial vehicles …

A Study on IoT layered Attacks and Countermeasures

S Surendran, V Sarasvathi - 2022 4th International Conference …, 2022 - ieeexplore.ieee.org
The Internet of Things is the next era of communication. There are many types of IoT devices
which are now used widely in different fields such as, home automation, agriculture, in …

Deep learning approaches in face analysis

D Cakir, S Akay, N Arica - Learning Control, 2021 - Elsevier
Although face analysis algorithms have changed over the decades, almost in every face-
related algorithm it is still usually the case that the order of the problem solving algorithm is …

[图书][B] Proactive defense strategies against net load redistribution attacks in cyber-physical smart grids

H Zhang - 2022 - search.proquest.com
Recent advances in the cyber-physical smart grid (CPSG) have enabled a broad range of
new devices based on information and communication technology (ICT). An open network …

Brittle features of device authentication

W Garcia, A Chhotaray, JI Choi, SK Adari… - Proceedings of the …, 2021 - dl.acm.org
Authenticating a networked device relies on identifying its unique characteristics. Recent
device fingerprinting proposals demonstrate that device activity, such as network traffic, can …

DSP: a deep learning based approach to extend the lifetime of wireless sensor networks

J Press, S Arslanturk - International Journal of Sensor …, 2020 - inderscienceonline.com
Wireless sensor networks (WSNs) equipped with batteries and solar panels enabled
applications in areas such as environmental monitoring, agricultural, military, and medical …

Changing the outlook of security and privacy with approaches to deep learning

S Paliwal, V Bharti, AK Mishra - Trends in Deep Learning Methodologies, 2021 - Elsevier
Today, overwhelming expansion in the usage of Internet of Things-based devices has
opened the way to new security threats and vulnerabilities globally. Ranging from public to …

Security method for internet of things using machine learning against cyber attacks

TA Ahanger, A Aljumah - Proceedings of the 2020 4th International …, 2020 - dl.acm.org
Internet of things is a huge network of large number of devices with sensors. This group of
devices is estimated to grow over 25 billion in 2020 as its growth since its evolution has …